Professional Documents
Culture Documents
Information System in Companies
Information System in Companies
1
Syllabus of the course:
▪ General introduction
▪ Text processing (WORD)
▪ Spreadsheets (Excel)
▪ Presentations ( Powerpoint)
2
Student behavior 3
3
Communication with the professor 4
4
IT Management course objectives 5
5
IT Management course objectives 6
6
0.6. Rating system 7
classroom ): 10%
▪ Continuous control: 20%
▪ Project: 20%
7
Syllabus of the course:
2 Hours :
4 Hours : PW 2 Hours : PW 2 Hours : DW 8 Hours : DW
Course
Information
General Text Presentation
systems EXCEL
Introduction processing software
management
8
General introduction
9
The information…?
10
Strategic role of the information
▪ It influences decision-making.
▪ The applications adapt to the interests of the company's strategy.
They make it possible to use information to gain market influence.
▪ Information systems make possible, or support, changes in the
company's product or the way the company faces competition in the
industry.
11
Global vision of a company
Decide actions to do Decision system
12
Information System - Definition
13
Information System - Definition
14
Information system
15
Computer System
16
And the big question is…
How to make a "good" information system?
▪ Production
▪ Translation of algorithms in a chosen language.
▪ Software tests
▪ Verification and validation of the software.
▪ Non regression tests.
▪ Exploitation
▪ Use the software once installed.
▪ Maintenance
▪ Correction of errors.
▪ Feature additions. 17
▪ …
The nature of the Information System
The IS and the company functions
The typical enterprise can be summarized as follows:
▪ Accounting and inventory management.
▪ Office automation.
▪ Sales and Marketing.
▪ Production and manufacturing.
▪ Logistics and customer relationship supplier.
▪ Management and direction.
19
Accounting
▪ An accounting information system (AIS) is a structure that a business
uses to collect, store, manage, process, retrieve and report its
financial data.
▪ Accountants ensure that the AIS provides the highest level of
accuracy in a company's financial transactions and record-keeping.
▪ Accounting information systems generally consist of six primary
components: people, procedures and instructions, data, software,
information technology infrastructure, and internal controls.
20
Inventory management
▪ An inventory management system is the combination of technology
(hardware and software) and processes and procedures that
oversee the monitoring and maintenance of stocked products.
▪ A complete inventory management system
• Identification System.
• Hardware tools.
• Inventory management software.
• Processes and policies
• Peaple.
21
Office automation
▪ Office automation (OA) refers to the collective hardware, software
and processes that enable automation of the information
processing and communication tasks in an organization.
▪ It includes:
• Computers .
• Software .
• Internet connectivity and email programs
• Fax and printing services
• Instant communication
22
Sales and marketing
23
Production and manufacturing
24
The problem of decision makers
Scattered data:
▪ Race to information
Moving data
▪ Medium and long term impossible analysis
Incompatible formats
▪ No possible consolidation or comparison
25
The integration of information systems
26
Main standards
We distinguish two large types of norms or standards:
▪ Management (or organizational) standards.
▪ Products standards (or service).
The trend observed is the reconciliation between the management standards and
the product standards: the improvement of the process must have as objective the
quality of the product.
27
Main repositories
28
IT in companies: Support service
29
Hardware & Software
30
Operating System
31
The softwares
Conceptualization
Database Interface
Proof of concept (interest, unit of
software, ...)
Development
Code
Support (ASS) and software
improvement (updates, ...)
32
Security of information systems: Definition
Definition
and Concept
Information Systems Security (ISS) is the set of technical, organizational, legal and human means required to
maintain, restore, and guarantee the security of information and the IS.
Overall design
The security of an IS can be compared to a chain of more or less resistant links. It is then characterized by the security
level of the weakest link.
Thus, the security of the IS must be approached in a global context:
▪ user awareness of security issues,
▪ logical security, that is, data security,
▪ network security,
▪ system security,
▪ telecommunications security,
▪ application security,
▪ physical security, ie security at the level of physical infrastructures.
33
Business continuity and IS
Continuity of service is the ability of an organization to continue to provide an agreed
level of service in case of a serious event.
34
IS securing methods
Preventive (avoid discontinuity)
▪ Backup of data by regular copies
▪ Backup systems: by redundancy of data, and creation of relocated emergency
sites (clean rooms, hot / cold / warm sites)
Curatives (restore continuity after a disaster)
According to the criticality of the breakdown:
▪ Data recovery by re-implementation of saved datasets
▪ Resuming applications or machines by temporarily using backup sites, before
repairing and rebasing users to dedicated applications / machines
35 35